IBS Alert

As you read this, you already may be walking a show floor somewhere, finding out about the latest technology or learning new ways to apply your electrical contracting expertise with the help of educational seminars and conference sessions. There is plenty coming your way, including the International Security Conference & Exposition East (ISC East), scheduled for Sept. 11–12, 2007, in New York at the Jacob Javits Convention Center.

This is the second year ISC East will join with Infosecurity, New York, the information technology (IT) side of the business, to provide a rounded approach to the physical and logical sides of protection and detection. ISC East is the only physical security event offering IT solutions through this concurrently scheduled show.

Urban Security

If you are involved in the public/cultural market, then you will not want to miss the special area at ISC East devoted to Urban Security. This “show within a show” features the emerging products that protect cities and commercial properties, including perimeter and barrier protection; port and cargo security; detection technologies and a host of related services.

Be sure to check out SmartHome@ISC with solutions for residential automation, including audio, video, communications, controls and electrical. See www.isceast.com for more information.

Looking ahead to Oct. 5–8, 2007, the National Electrical Contractors Association will host its annual show in San Francisco at the Moscone Convention Center. Visit www.necaconvention.org for details. ¶

Securing Cultural Facilities from Theft

A growing number of incidents of theft, illegal export and import and illicit trafficking of cultural property such as artifacts, artwork, rare books and antiquities are reported around the world. Although statistics are hard to come by, many experts believe the majority of these thefts are inside jobs.

“According to the FBI and Interpol, theft from collections in cultural institutions is thought to be the third-

largest international crime,” said Wilbur Faulk, executive vice president of the Cultural Property Protection Group based in Northridge, Calif.

Technology plays a vital role in combating this type of crime. “There are a wide variety of notification, technology and audit tools that are available,” Faulk said. “More and more stand-alone systems are now being integrated in a way to enhance economy and efficiency as well as ease of use for personnel operating the equipment.”

Dual technologies are being used by a growing number of cultural institutions. “For example, art storage areas have had lock and key access for many years,” Faulk said. “Now, many institutions have two or more ways of authenticating an individual seeking access, including a card reader.”

Many cultural institutions are using camera systems that memorize the contents of a room. When any movement or change in the room is noticed, an alarm is activated.

According to Faulk, neither the use of security personnel or technology alone is adequate to combat theft. “The combination of both of these elements is what will lead to success,” he said.

—Susan Feinberg

Protecting Libraries’ Security

Protecting library services and data and the privacy of library users against hacking, worms and viruses has become a paramount concern. Although these kinds of threats have existed for more than a decade, the sophistication of the attacks has been increasing in recent years. The result is lost data, interrupted services and compromised privacy of library patrons.

“Libraries’ databases with names, addresses and phone numbers of patrons are vulnerable, and we take that very seriously,” said Marshall Breeding, director of innovative technologies and research at Vanderbilt University Library in Nashville. “We want to make sure that a hacker or worm does not lead to exposure of that information.”

Hackers regard library systems as an easy mark and a jumping-off point to other networks or computers, he said.

Libraries around the country have developed new strategies to safeguard their security. “There’s been an evolution from departmental capacity to enterprise capacity in universities and municipalities,” he said. “We rely a lot more on a broader security architecture of our host institutions, rather than trying to do everything ourselves.”

Many libraries are using a multilevel approach that incorporates tools such as desktop-level virus software and firewalls on the edge of their networks, especially surrounding data centers.

Breeding predicts hackers will have diminishing success in attacking libraries’ databases. According to him, libraries are becoming increasingly well guarded.

—Susan Feinberg

Security and IT News

AirVisual Inc., New York, announced it has begun to survey and test New York City Metropolitan Transit Authority’s facilities for an IntelliViewer remote surveillance and security system.

Honeywell, Minneapolis, announced the acquisition of Burtek Systems Corp. and the security systems division from Richardson Electronics Ltd.

Integrated Security Systems Inc., Carrollton, Texas, announced its wholly owned subsidiary, B&B ARMR Corp., received an order destined for delivery and installation at a U.S. embassy in North Africa.

Leviton Manufacturing Co., Little Neck, N.Y., helped outfit Birmingham’s new $7 million, 33,000-square-foot Ronald McDonald House with energy and cost-efficient technologies. Joining with DuPont, Kohler, American Standard and others, Leviton contributed a supply of its Decora electronic timer switches to the combined pool of more than $1 million in donated product.

Middle Atlantic Products, Fairfield, N.J., announced its MRK series equipment rack received OPA approval from the Office of Statewide Health Planning and Development (OSHPD) in California.

Samsung Electronics America Inc., Anaheim, Calif., announced a new collaboration with 3M to offer a state-of-the-art digital signage solution.